Author of the publication

A Comprehensive Security Analysis Checksheet for OpenFlow Networks.

, , , , , , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 231-242. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for the User-Oriented Personal Information Protection., and . Security and Management, page 12-19. CSREA Press, (2006)RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust., , , , and . J. Inf. Secur. Appl., (2019)Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks., , , and . J. Inf. Sci. Eng., 31 (2): 727-742 (2015)Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework., , , , and . J. Networks, 9 (11): 2905-2913 (2014)A Comprehensive Security Analysis Checksheet for OpenFlow Networks., , , , , , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 231-242. Springer, (2016)Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (1): 98-112 (2003)Analysis of Program Obfuscation Schemes with Variable Encoding Technique., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (1): 316-329 (2008)Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol., , , and . IEICE Trans. Inf. Syst., 93-D (11): 2953-2961 (2010)A new security middleware architecture based on fog computing and cloud to support IoT constrained devices., , and . IML, page 35:1-35:8. ACM, (2017)Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols., , and . STACS, volume 1373 of Lecture Notes in Computer Science, page 511-521. Springer, (1998)